Advertisement
Guest User

Untitled

a guest
Jul 28th, 2020
75
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.28 KB | None | 0 0
  1. Jul 28 21:32:36 charon 15[MGR] checkin and destroy of IKE_SA successful
  2. Jul 28 21:32:36 charon 15[IKE] <244> IKE_SA (unnamed)[244] state change: CONNECTING => DESTROYING
  3. Jul 28 21:32:36 charon 15[MGR] <244> checkin and destroy IKE_SA (unnamed)[244]
  4. Jul 28 21:32:36 charon 15[JOB] <244> deleting half open IKE_SA with <CLIENT IP ADDRESS> after timeout
  5. Jul 28 21:32:36 charon 15[MGR] IKE_SA (unnamed)[244] successfully checked out
  6. Jul 28 21:32:36 charon 15[MGR] checkout IKEv2 SA with SPIs 87d02561ab3db013_i f9aed31554a0e7a4_r
  7. Jul 28 21:32:06 charon 01[MGR] <244> checkin of IKE_SA successful
  8. Jul 28 21:32:06 charon 01[MGR] <244> checkin IKE_SA (unnamed)[244]
  9. Jul 28 21:32:06 charon 01[NET] <244> sending packet: from <PFSENSE IP ADDRESS>[500] to <CLIENT IP ADDRESS>[500] (481 bytes)
  10. Jul 28 21:32:06 charon 01[ENC] <244> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(CHDLESS_SUP) N(MULT_AUTH) ]
  11. Jul 28 21:32:06 charon 01[IKE] <244> sending cert request for "CN=<PFSENSE IP ADDRESS>"
  12. Jul 28 21:32:06 charon 01[IKE] <244> remote host is behind NAT
  13. Jul 28 21:32:06 charon 01[LIB] <244> size of DH secret exponent: 2047 bits
  14. Jul 28 21:32:06 charon 01[CFG] <244> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
  15. Jul 28 21:32:06 charon 01[CFG] <244> configured proposals: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
  16. Jul 28 21:32:06 charon 01[CFG] <244> received proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC_256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_2048
  17. Jul 28 21:32:06 charon 01[CFG] <244> proposal matches
  18. Jul 28 21:32:06 charon 01[CFG] <244> selecting proposal:
  19. Jul 28 21:32:06 charon 01[CFG] <244> no acceptable INTEGRITY_ALGORITHM found
  20. Jul 28 21:32:06 charon 01[CFG] <244> selecting proposal:
  21. Jul 28 21:32:06 charon 01[IKE] <244> IKE_SA (unnamed)[244] state change: CREATED => CONNECTING
  22. Jul 28 21:32:06 charon 01[IKE] <244> <CLIENT IP ADDRESS> is initiating an IKE_SA
  23. Jul 28 21:32:06 charon 01[ENC] <244> received unknown vendor ID: 01:52:8b:bb:c0:06:96:12:18:49:ab:9a:1c:5b:2a:51:00:00:00:02
  24. Jul 28 21:32:06 charon 01[IKE] <244> received Vid-Initial-Contact vendor ID
  25. Jul 28 21:32:06 charon 01[IKE] <244> received MS-Negotiation Discovery Capable vendor ID
  26. Jul 28 21:32:06 charon 01[IKE] <244> received MS NT5 ISAKMPOAKLEY v9 vendor ID
  27. Jul 28 21:32:06 charon 01[CFG] <244> found matching ike config: <PFSENSE IP ADDRESS>...%any with prio 1052
  28. Jul 28 21:32:06 charon 01[CFG] <244> candidate: <PFSENSE IP ADDRESS>...%any, prio 1052
  29. Jul 28 21:32:06 charon 01[CFG] <244> candidate: %any...%any, prio 24
  30. Jul 28 21:32:06 charon 01[CFG] <244> looking for an IKEv2 config for <PFSENSE IP ADDRESS>...<CLIENT IP ADDRESS>
  31. Jul 28 21:32:06 charon 01[ENC] <244> parsed IKE_SA_INIT request 0 [ SA KE No N(FRAG_SUP) N(NATD_S_IP) N(NATD_D_IP) V V V V ]
  32. Jul 28 21:32:06 charon 01[NET] <244> received packet: from <CLIENT IP ADDRESS>[500] to <PFSENSE IP ADDRESS>[500] (632 bytes)
  33. Jul 28 21:32:06 charon 01[MGR] created IKE_SA (unnamed)[244]
  34. Jul 28 21:32:06 charon 01[MGR] checkout IKEv2 SA by message with SPIs 87d02561ab3db013_i 0000000000000000_r
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement